Direct Vulnerabilities

Known vulnerabilities in the rosa package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Cross-site Scripting (XSS)

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Improper Validation of Specified Index, Position, or Offset in Input

*
  • H
Improper Validation of Array Index

*
  • H
Improper Certificate Validation

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
CVE-2025-68121

*
  • M
Directory Traversal

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Improper Certificate Validation

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Expected Behavior Violation

*
  • M
Race Condition

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • H
Asymmetric Resource Consumption (Amplification)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Resource Exhaustion

*
  • M
Misinterpretation of Input

*
  • H
Resource Exhaustion

*
  • H
Uncontrolled Recursion

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Resource Exhaustion

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Insufficient Entropy

*
  • H
Improper Authorization

*
  • M
Buffer Overflow

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Improper Certificate Validation

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • L
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Buffer Access with Incorrect Length Value

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
HTTP Response Splitting

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Information Exposure

*
  • M
CVE-2022-41715

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Use of Uninitialized Variable

*
  • H
Memory Leak

*
  • M
SQL Injection

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*